Earticle

현재 위치 Home

International Journal of Multimedia and Ubiquitous Engineering

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • pISSN
    1975-0080
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.11 No.5 (39건)
No
1

The Fuzzy Prediction Control Methods of Crop Growth Process

Lan Wu, Zhongqin Li, Yanbo Hui

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Today the huge demand for high-quality crops allowed the research on the improvement of crop quality and cultivation techniques to give increasing attention. Through effective variety selection and optimal control of the growth process, maintaining the long-term best growth environment is an important means to improve crop quality and yield. Due to the quality of the wheat crop ecological variability and complexity of the formation process, the effective forecasting and management under different conditions of wheat growth process becomes quite difficult. Aiming to the characteristics, such as nonlinear, time-varying, strong correlation, time-delay and more uncertainty, between the crop quality and various influencing factors, a modeling method of nonlinear dynamic multi-input multi-output system based on PLS and TS model is proposed. On this basis, a Generalized Predictive Controller (GPC) under implicit variable space is designed, which is provide a scientific basis for the realization of effective crop forecasting and control, to increase production, improve quality , regulating the growth cycle and increase economic efficiency purposes. The test results show that this method can effectively track the signal and meet the system demand.

2

Design of a Subtitle System for Internet TV Systems

Jaegeol Yim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.11-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Globalization was one of the most popular words in Korea about 20 years ago. Koreans believed that a nation cannot join the ranks of developed countries unless that nation is globalized. In order for Internet TV systems to be globalized and to spread throughout the world, broadcasters must provide a subtitling service in foreign languages. Otherwise, their programs cannot be understood by foreigners. There are authoring tools and automatic translators that can generate subtitles. This paper reviews techniques needed in subtitle system development, and introduces the design of a subtitle system for Internet TV. One of the distinguishing features of the design is that a machine translator is integrated into the system. A crawler is proposed as part of the translator to collect cultural and tourism proper nouns.

3

3D Unsteady Simulation of the Transport Characteristics in the LEC Melt of In-Doped GaAs

Shuxian Chen, Shilin Li, Xiaoming Tan

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.21-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A three-dimensional and time-dependent turbulent mathematical model is established for the mass, heat, momentum and dopant transport in the LEC melt of In-doped GaAs. The Solution scheme for the dopant segregation effect at the melt/crystal interface is put forward. Grid testing calculations have been performed for the choice of the grid. The turbulent mathematical model and numerical methodology are used to simulate the melt convections and dopant transports in the previously published experiments, and the numerical accuracy is validated by comparing the results with the experimental data in different model setups. Some transport characteristics in the LEC melt of In-doped GaAs have been concluded. Owing to the interacting forces associated with different length scales in the LEC melt, the fluid flow is non-axisymmetric. Because of the competition between buoyancy, Marangoni force, centrifugal force and the Coriolis force, the temperature fluctuates in the melt. Due to the segregation, the InAs concentration increase in the axial direction.

4

Research of the Exciting Current Detection Method of MCR

Wang Jun, Wei Liangliang, Chen Feng, Nie Dexin, Lu Wenhua

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.31-42

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Magnetic valve controllable reactor (MCR) is a kind of dynamic reactive power compensation device. The exciting current of MCR is one of the important indexes of operating condition of MCR. This paper firstly analyzed the principle of MCR, and deduced the relationship between the exciting current and the output current, verified by MATLAB/SIMULINK. And then an effective method to detect the exciting current was proposed by this paper. The method has the advantages of optical fiber isolation, high detection precision, strong anti-interference, etc. Finally, a 220v/1200var MCR was experimented in detail. The results demonstrate the accuracy of the theoretical analysis.

5

Cooperative Diversity Selection Protocol Using Pareto Method with Multi Objective Criterion in Wireless Ad Hoc Networks

Nyoman Gunantara, Nyoman Putra Sastra

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.43-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In cooperative diversity of ad hoc networks, the selection of the path pair becomes very important to achieve optimum performance. In this paper, it was created the cooperative diversity protocol by using Pareto method for multi objective criteria problems namely the signal to noise ratio (SNR) and load variance. Pareto method was used to find a non-dominated solution by way of Continuously Updated. The non-dominated solution was chosen based on the smallest euclidean distance. The advantage of this protocol is to provide fair and the best path pairs of cooperative diversity. From the simulation results, it was obtained the path pairs for cooperative diversity is path S-11-D and S-28-D selected by the smallest value of euclidean distance that is 0.108 and 0.379. Furthermore, the reliability of protocol with Pareto method was compared with

6

Morphological Detection Method of Micron Wood Fiber Based on Skeleton Information

Honge Ren, Simiao Hu, Meng Zhu

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.55-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to compensate for the lack of mathematical model support for the traditional study of fiber morphology, using polynomial fitting to build microns wood fiber morphological model based on skeleton information. The fiber morphological category can be distinguished by taking derivation of the fitting function. In order to overcome the disadvantages of common morphological detection, the measurement of fiber length and its degree of curvature by using skeleton information is carried out. The length of the skeleton is approximated as the true length of the wood fiber, and the projected length can be calculated according to the endpoint coordinates. Finally, the fiber's curl index was obtained. Through the experiment, it has verified rationality of the fiber morphology model, and it is proved that the measurement method based on skeleton information can be better to avoid the influence of wood fiber morphological changes to the length measuring accuracy, moreover the fiber curl index can be calculated to quantify the bending degree and the type of wood fiber. It is an effective morphological detection method.

7

Types of Interactions and Feedbacks of Different Smart-Phone Contents

Ho-Eun Lee, Young-Ju Lee

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.65-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study includes literature researches on interaction types for different contents in order to examine interaction and information perception among users. It turned out that information perception among users was in close relation with feedbacks. Repeated and lasting feedbacks result from touch events of fingers on the smart-phone screen, and these events maintain a series of rules. Touch events are most frequently used in a familiar user environment, and they are divided to several types: static feedbacks such as tap, double tap, and long tap; active feedbacks such as drag, flick, and multi-touch; and combinations of different types of feedbacks. Interaction types involve user tasks such as click, screen transition, zoon-in/out, and icon movement. UI elements include springboards, icons, navigations, controllers, table lists, etc. It turned out that the same interactions might be used among different UI elements. Most frequently used mobile internet service items include data and information acquisition, communication, leisure activity, GPS service, and economic activity in order. As contents were classified with corresponding UI elements based on these items, it turned out that the most frequently used elements were navigations and table lists, and that the corresponding interaction types were taps and drags. Since data and information acquisition was ranked first among goals of using smart-phones, tabs, an interaction type related to screen execution and hyperlink, were most frequently used. It also turned out that drag was often used for text-based contents, and this is because drag interaction was frequently necessary to scroll the screen upward or downward to read contents on a small smart-phone screen. Feedbacks result from interaction, and the most frequently used types of interaction are 'basic' and 'dynamic active' types. In addition, as UI elements were examined for different contents and interaction types, it turned out that the most frequently used UIs for contents were table lists, which involved interactions types such as 'tab,' 'drag,' and 'flick.‘

8

Medical Monitoring Model of Internet of Things Based on the Adaptive Threshold Difference Algorithm

Beibei Dong, Jingjing Yang, Yanli Ma, Xiao Zhang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.75-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

There are still problems such as low detection accuracy and poor noise immunity in the application of the standard threshold difference algorithm in the signal detection of electrocardiosignal (ECG), in this paper, a medical monitoring model based on the adaptive threshold difference is proposed. First we use a nonlinear filter to filter the P wave and T wave which are low frequency in ECG signal. Then complex wave QRS will be tested. Then the algorithm will be more accuracy through the detection of the R-R interval length and the adjustment of threshold. Finally, the ECG signal will be test with quadratic spline wavelet twice, and the error judgment will be known through adaptive threshold difference. In the simulation experiments, after judging error by wavelet transformation and making the standard threshold difference algorithm optimize adaptively, algorithm showed excellent detection accuracy with and without noise.

9

Model-Based Design Methodology for Sampling Rate Converter

Nie Yang, Ge Hua, Jing Li-li

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.83-92

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The design of high-speed sampling rate converter in multi-rate system is a very complicated problem. The traditional development flow is not simply low efficiency, and but also is difficult to implementation. This paper presents a development flow by model-based design to simplify the design process, to improve work efficiency. Sampling rate converter is designed by a hybrid scheme using polyphase filter and Farrow filter structure. Through the development flow of model-based design, circuit modeling is very easy to do, and the RTL code and test code are automatically generated. The simulation results show that this method can greatly reduce the system consumption and promote the performance of the system.

10

DC/DC Converter Design which Ensures Stable Motion of Ventilation Inverter

Young-Choon Kim, Ok-Hwan Kim, Moon-Taek Cho

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.93-104

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

When the ventilation inverter (ventilation inverter, VTI) of high-speed rolling stock normally receives power supply from stringing, it receives power from supplementary power device and supplies power to the ventilation fan. At this point, entry to neutral section blocks regeneration, burning the regeneration energy through resistance. Using a tap of resistance as VTI power at this point receives and converts input of rough electricity, causing consistent breakdown of VTI and ultimately leading to stop in operation. Also, entry to neutral point activates the chopper, burning energy through resistance. Switching the location of resistance and chopper solves many aspects, but it does not solve fundamental problems. As a result, this study solves the fundamental problem of VTI by installing DC/DC converter that receives input of DC Link 2800[V] and converts it into 670[V] when entry to neutral point occurs, enabling stable power supply.

11

Development Research of Marine Engine Room Simulator for Offshore Supply Vessel Based On Virtual Reality Technology

Haosheng Shen, Jundong Zhang, Hui Cao, Jing Feng

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.105-120

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at the present status that the absence of marine engine room simulator for OSV (Offshore Supply Vessel) in China market and the need to improve the working ability of engineers in OSV, the marine engine room simulator for OSV based on virtual reality technology is developed which chooses the first high-class horsepower deep-water AHTS (Anchor Handling Towing Supply Vessel) “HAI YANG SHI YOU 681” as the parent ship. The development concept, system structure, development process is elaborated. To improve the training effect, several utilitarian functions are added, such as information-display for interactive entity, two-dimensional visualization system interface, equipment document management, search and locate for interactive entity and equipment. To make the evaluating result convincing, fuzzy evaluating method is adopted to implement the evaluating function. The result shows that the virtual scene is real and delicate, interactive mode is quick and utilitarian, evaluating function is accurate and reliable. The successful development of the system will promote education and training for OSV engineer in China.

12

Storytelling Strategy Based on Locality of Jeju Island

Jeong-Hee Kim, Jong-Youl Hong

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.121-130

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A policy for developing local culture has been magnified these days. Visual-image Content especially plays a central role in developing OSMU in Korea, and so local governments actively support this field. Jeju has served as the backdrop for a number of visual-image content thus far by utilizing its own characteristics, such as its natural environment, its myths, and its living culture. This study attempted to examine the most effective method to incorporate regional characteristics into the planning of visual-image content. My Mother the Mermaid used the strategy of adding its thematic meaning based on a good understanding of the symbolic spatial representation of Jeju. It is important to find any connection with the story from the spatial materials used in the film and apply special meanings to them.

13

Research of D2D Dynamic Power Control Algorithm Based on Interference Restricted Area in Multi-Cell

Janbin Xue, Supan Wei, Yiming Chen

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.131-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In cellular networks, the application of device-to-device (D2D) technology can effectively improve the system spectral efficiency. In order to research the performance of D2D communication in multi-cell cellular system, this paper proposed a dynamic power control algorithm based on interference restricted area to solve the interference problem between D2D communication and cellular communication in multi-cell. First we use Laplace Transform to analyze the interference, then based on the analyze of outage probability and area spectral efficiency, through system-level simulation, research the impact of D2D user equipment density, D2D communication distance and different interference restricted area sizes on outage probability and area spectral efficiency. Simulation results show that interference restricted area can effectively reduce communication outage probability, as well as improve system area spectral efficiency.

14

Study on Fuzzy Energy Management Strategy of Parallel Hybrid Vehicle Based on Quantum PSO Algorithm

Yang Lihao, Wang Youjun, Zhu Congmin

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.147-158

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A fuzzy energy management strategy was designed for the single-axle parallel hybrid electric vehicles, and then the quantitative factor of the fuzzy logic controller was optimized by the quantum PSO algorithm under the Matlab platform based on the equivalent fuel economy. Then a comparison test about the energy management before and after the optimization was carried out based on the secondary development of Advisor which proves that the energy management strategy optimized by the quantum PSO algorithm can improve the SOC of the battery pack by 18% when the VAIL2NREL cycle finished while the power of the vehicles nearly remain the same. What’s more, the optimized strategy can make the engine and the motor works in the high efficient area for most of the time which can improve the recycling rate of the energy and reduce the equivalent fuel consumption effectively.

15

An Ontology-Based Content Provision System to Advance Child Obesity Management Platforms

Hyunmo Koo, Heon Jeong, Ungu Kang, Byungmun Lee, Youngho Lee

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.159-170

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The 2014 National Health and Nutrition Survey of Korea reported that child/teenager obesity rates are 11.5% in 6-18 year olds, 5.9% in 6-11 year olds, and 15.5% in 12-18 year olds. Child obesity is a disease caused by changes in social environment structure and may become a chronic disease that leads to adult obesity; thus, prevention and management are becoming increasingly critical. Education and policies for obesity prevention are in place in Korea, but their effects are limited and temporary because no personalized education is provided. Therefore, this study proposes a service using data to set up obesity-related guidelines by using an ontology-based JENA engine to provide content tailored for child obesity. The goal of this study is to aid in obesity prevention and management by providing customized obesity-related content as contextual information for obese children and teenagers through ontology-based guidelines.

16

Research of Face Recognition System Based on Visual Intelligent Monitoring

He Zhiliang, Xiong Juntao, Mai Zhiheng, Zhong Pengfei, Tang Linyue

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.171-182

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The key technology of intelligent face recognition based on the visual monitoring was researched. Firstly, obtained the real-time scene by video camera, and the background difference method was used to judge whether there is a character goal in monitoring region, in view of the existing target, the color space of YCgCr and YCgCb were chosen to detect skin color, the geometric constraints that the aspect ratio of facial contour is 0.8 to 1.85 was used to realize the positioning of face region. Then the improved 2DPCA algorithm was used for face recognition, and data matching with the established database of face to determine the validity character identity. Finally the identification results were sent to the mobile terminal through the control system. System test results show that the processing speed of face recognition is 7 s/times, and the accuracy of face recognition results was 85%, which can provide technical support for the identity intelligent recognition of visual monitoring.

17

Finding Best Mining Scheme for Development of Multinomial Software Fault Prediction Model

Dipti Kumari, Kumar Rajnish

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.183-198

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper discuss different classification methods toward reliability and quality improvement of software systems by predicting fault-prone module before testing. Classification capability of Data mining techniques and Object-oriented property based knowledge stored in Object-Oriented metrics are used to classify the software module as fault-prone in different error categories or not fault-prone. Three versions of Eclipse, the java-based Open source Integrated Development environment as dataset for training and testing all the classification based data mining techniques are used. First of all, Threshold base feature ranking (i.e. Area under the ROC curve) is used for selecting effective OO-metrics in building prediction model. After that using those subsets of selected attributes, classification models are built with 41 different classifiers for multinomial classification in fault detection systems. Finally, the performance of a classifier is evaluated with respect to the PRC performance metric. Based on the performance results appropriate classifiers (Random Committee, Random Tree, Randomizable Filtered classifier and IBK) which depict a higher performance and accuracy compared to the others are selected. Our results indicate that Random Tree, Random Committee and Randomizable Filtered Classifier have same performance. IBK classifier also has same performance but little bit less and Kstar has less performance compared to previous four selected classifiers.

18

Privacy-Preserving One-Class Support Vector Machine with Vertically Partitioned Data

Qiang Lin, Huimin Pei, Kuaini Wang, Ping Zhong

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.199-208

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We establish a new model of privacy-preserving one-class support vector machine (SVM) based on vertically partitioned data. Every participant holds all the data with a part of attributes. They apply different random matrices to establish their own kernel matrix. By sharing these partial kernel matrices, we construct a global kernel matrix and establish linear and nonlinear privacy-preserving models. Experimental results on benchmark data sets verify the validity of the proposed models.

19

Text Recognition Algorithm Based on Text Features

De Li, XueZhe Jin, LiHua Cui

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.209-220

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

It is difficult to realize the text watermarking algorithm on natural language, and the format of text watermarking algorithm has poor robustness against format attacks. This paper presents the new text recognition algorithm based on the text feature. The words are segmented and extracted according to the text feature. The feature dimensions are reduced with the technology of LSA and stop-words database. The new similarity method is also defined to determine the threshold in order to detect the watermarking. The experimental results indicate that the proposed algorithm has better operating efficiency and stronger robustness than the previous researches. This algorithm can also handle the text document written in both Chinese and English effectively.

20

The Intonation Pattern of Imperative Sentences in Uyghur Language

Seyyare Imam, Hankiz Yilahun, Akbar Pattar, Askar Hamdulla

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.221-230

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Based on the notion of intonation pattern and method of undulating scale computation, this paper has done a quantitative analysis to the intonation patterns of imperative oral sentences in standard Uyghur language. And give the pitch contour distributions of representative sentences and their different tone groups for the first time. The experimental results show that whether from the contour curves of overall sentences or fluctuations of tone groups pitch contour curves and the width variations, we can observe the distinctive features between different pronunciations. And can also observe the subtle tone differences between different types of statements voiced from a same text sentence.

21

Efficient Document Similarity Detection Using Weighted Phrase Indexing

Papias Niyigena, Zhang Zuping, Mansoor Ahmed Khuhro, Damien Hanyurwimfura

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.231-244

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Document similarity techniques mostly rely on single term analysis of the document in the data set. To improve the efficiency and effectiveness of the process of document similarity detection, more informative feature terms have been developed and presented by many researchers. In this paper, we present phrase weight index, which indexes documents in the data set based on important phrases. Phrasal indexing aims to reduce the ambiguity inherent to the words considered in isolation, and then improve the effectiveness in document similarity computation. The method we are presenting here in this paper inherit the term tf-idf weighting scheme in computing important phrases in the collection. It computes the weight of phrases in the document collection and according to a given threshold; the important phrases are identified and are indexed. The data dimensionality which hinders the performance of document similarity for different methods is solved by an offline index creation of important phrases for every document. The evaluation experiments indicate that the presented method is very effective on document similarity detection and its quality surpasses the traditional phrase-based approach in which the reduction of dimensionality is ignored and other methods which use single-word tf-idf.

22

Study the Phenomenon of Cross-Media between Video Media and Webtoon

Chan-Ik Park

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.245-252

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cross-media phenomenon, which is a remediation of webtoon as original to movie and soap opera, has been becoming more active since the mid 2000s. As the story is complete and its contents are amusing, the remediation of webtoon has been increasingly becoming active. However, it has rarely become a high-grossing movie or received high viewer ratings. This study derived success factors through an comparison of the narrative structures and visual factors of “Secretly, Greatly”, which became the highest-grossing film and "Misaeng”, which got high viewer ratings and got a reputation as well-made soap opera, with the webtoon as the original. However, it has rarely become a high-grossing movie or received high viewer ratings. This study derived success factors through an comparison of the narrative structures and visual factors of “Secretly, Greatly”, which became the highest-grossing film and "Misaeng”, which got high viewer ratings and got a reputation as well-made soap opera, with the webtoon as the original.

23

The Growth of Korean Companies and Their Contributions to the Miracle of the Han River

Phuoc Cuu Long Le, Jong Ik Kim, Kunbae Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.253-266

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Over the past six decades, the Korean economy has witnessed remarkable growth. In the 1950s, when the government was first established, Korea was the one of the poorest countries in the world. Now, it has grown as a global economic power with a solid industrial base. Korea’s economic success since then has been named “the Miracle of the Han River”. Along with the growth of the economy, there is an enormous contribution from Korean companies which probably started from small shops and have grown to become global giants. There are some studies about the Korean economy and Korean companies, especially Chaebols. These studies mainly focus on the relationship between value and ownership structure, and the gap between controlling power and cash flow ownership. However, there is a controversy over how the companies have contributed to the success of the Korean economy. These critical issues have attracted the attention of not only academic scholars but also policy makers. This study aims to present the outstanding post-war development of the Korean economy with a particular concentrate on the role played by Korean companies. First, the growth of Korea economy is reviewed. Second, we cover the growth of Korean firms, which have contributed remarkably to the national economic development. Third, we provide an overview of government policy and the external environment facing Korean firms, and discuss about the intervention of government in business activities that lead to industrialization. Fourth, we show how Korean businessmen have carried out business activities in conjunction with the government-directed economic policies. Findings from this study highlight many implications for the developing countries and their business sector.

24

Analysis of Multi-Farmers’ Technology Adoption Behavior

He Liang, Zhujie Chu, Yanzhao Lyu, Weiyi Yang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.267-274

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Due to farmers’ limited knowledge and judgment ability, obvious herding behavior during the process of technology innovation adoption is a common phenomenon. In this light of thinking, this paper constructs game model and spread model of technology innovation adoption of multi-farmers and then develops the empirical analysis. The empirical analysis shows that exchange earnings is an important factor to determine whether herding behavior happens in the process of multi-farmers’ technology innovation adoption, and the exchange range and cost also have an effect on the farmers’ decision-making behavior adoption.

25

Simulation Analysis for Static Fracture Properties of DCB Aluminum Foams Bonded with Mode III Type

Jung Ho Lee, Jae Ung Cho

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.275-284

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study aims to investigate static fracture properties on adhesive layers by conducting simulation static analysis by thickness. Simulation analysis result showed that all specimens at t=35mm, 45mm, and 55mm showed maximum reaction force at approximately 5mm of forced displacement. Simulation analysis showed that maximum reaction forces of specimen models were approximately 0.25kN at t=35mm, approximately 0.28kN at t=45mm, and approximately 0.5kN at 55m, respectively. As such, the maximum reaction forces of specimen models that occur had increasing tendency along with increasing thickness. The study results showed fracture properties of aluminum foam adhesive specimen models at their adhesive layers. Based on accumulated data, it is thought that the data on variables other than variables in this study may be acquired easily, and that the data would contribute to analyzing mechanical properties of DCB adhesive structures with mode III-type.

26

Optimal Bandwidth Reservation for Video Streaming in DiffServ Domain

Zheng Wan

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.285-296

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the emergency of more and more video applications, the problem of providing differentiated Quality of Service (QoS) for various kinds of streams should be solved. DiffServ was proposed to balance transmission guarantee of video and data streams. Existing studies focused on the promotion of video receiving quality by allocating excess resources. In this paper we propose an optimal bandwidth reservation mechanism, aiming at proper amount of bandwidth reservation and good video transmission performance. This mechanism tries to find a moderate reservation according to the video characteristics and buffer size of forwarding routers. Various video sequences and different buffer sizes are employed in the performance evaluation experiments and simulation results verify that (1) Proposed mechanism show its adaptability to data rate, data rate variation and continuous burst of the streaming video. (2) Proposed mechanism presents good performance under various buffer sizes. (3) The amount of bandwidth reservation, which is determined by the streaming video and buffer size of forwarding routers, is moderate to ensure video receiving quality.

27

Effect of Blended Learning in Nursing Education

Hee Jung Jang, Sun Yeun Hong

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.297-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study is a pre-post design experimental research on a nonequivalent control group with the aim of identifying the effects of blended learning in nursing education on critical thinking and learning satisfaction of the nursing students. The research subjects were 79 second-year nursing students of K University in G region, composed of 39 students in the control group and 40 students in the experimental group, gathered through convenience sampling. The two groups equally went through the pre-test using the questionnaire for data collection. Afterwards, blended learning was applied to the experimental group for three weeks in total. The collected data was analyzed using the SPSS PC+20.0 for windows. According to the research, the experimental group that participated in blended learning had a statistically significantly high score for critical thinking (t=-6.21 p<.001) and had a high, but not statistically significant, score for learning satisfaction (t=-.52, p=.683). Given the research findings, it was determined that blended learning in nursing education was more effective in improving the critical thinking of nursing students than the existing nursing education curriculum.

28

AoIP / AVB Technology and Application of Digital Audio Network

Yi Guo, Qiong Li

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.305-318

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the rapid development of Ethernet and IP technology, digital audio broadcasting over IP becomes the urgent question for radio stations. This paper analyses the facing problems for real-time transmission of digital audio over IP network, and discusses the corresponding solutions, focusing on the introduction of AoIP and AVB technology, and gives the application scheme of the actual. The solution also has a large number of applications in actual projects, which has the reality instruction significance.

29

Credit-Based Reliability Service Model in Wireless Communication Networks

Zonghai Ye

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.319-328

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In wireless communication networks, the reliability is greatly important that it is independent of the radio transmission approach, unfortunately due to the failure-prone nature of wireless communication networks, the ability of providing a stable link and consistent quality of service (QoS) to end-users is a key issue. Currently credit-based reliability system becomes a very important security mechanism in the wireless adaptive communication network. This paper introduces a credit-based reliability service model which uses the credit space expressed by the WATCHDOG mechanism so as to access the wireless self-organized network. In this model, the transformation from credit space to reliability space is proposed and the key characteristics are revealed. Experiments are carried out to examine the proposed model. It is observed that, the proposed model is able to evaluate the service value under the credit-based reliability capacity.

30

Development of the Customized User Interface of Digital Audio System in a Smart Home

Jung-Sook Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.5 2016.05 pp.329-336

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most significantly, user customized control for a sound of digital audio in a smart home must be able to adjust many environmental contexts simultaneously. A sound is affected by a temperature, humidity, and atmospheric pressure. And user must tune the sound of digital audio every time according to environmental contexts. In this paper, we developed a customized user interface for a remote control of digital audio in a smart home according to the environmental contexts. The kinds of input environmental contexts are a temperature, humidity, location, weather, and atmospheric pressure. It creates an experience especially for a user of digital audio sound, allowing the user to interact with the control for digital audio operation in a natural and intuitive way.

 
1 2
페이지 저장